prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Boot or Logon Autostart Execution:Registry Run Keys | DarkComet adds several Registry entries to enable automatic execution at every system startup. |
Boot or Logon Autostart Execution:Registry Run Keys | It has been known to establish persistence by adding programs to the Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | DarkTortilla has established persistence via the Software\Microsoft\Windows NT\CurrentVersion\Run registry key and by creating a .lnk shortcut file in the Windows startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | DnsSystem can write itself to the Startup folder to gain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | DownPaper uses PowerShell to add a Registry Run key in order to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has added the registry value ntdll to the Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | If establishing persistence by installation as a new service fails, one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD. |
Boot or Logon Autostart Execution:Registry Run Keys | Variants of Emissary have added Run Registry keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\…\CurrentVersion\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | EVILNUM can achieve persistence through the Registry Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | FELIXROOT adds a shortcut file to the startup folder for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has established persistence by using the Registry option in PowerShell Empire to add a Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | It has used Windows Registry run keys such as, HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD. |
Boot or Logon Autostart Execution:Registry Run Keys | It malware has created Registry Run and RunOnce keys to establish persistence, and has also added items to the Startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | Final1stspy creates a Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | Flagpro has dropped an executable file to the startup directory. |
Boot or Logon Autostart Execution:Registry Run Keys | FLASHFLOOD achieves persistence by making an entry in the Registry's Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | FlawedAmmyy has established persistence via the HKCU\SOFTWARE\microsoft\windows\currentversion\run registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | FunnyDream can use a Registry Run Key and the Startup folder to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It tools have registered Run keys in the registry to give malicious VBS files persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Gazer can establish persistence by creating a .lnk file in the Start menu. |
Boot or Logon Autostart Execution:Registry Run Keys | Gelsemium can set persistence with a Registry run key. |
Boot or Logon Autostart Execution:Registry Run Keys | gh0st RAT has added a Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Gold Dragon establishes persistence in the Startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | It malware can create a .lnk file and add a Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Grandoreiro can use run keys and create link files in the startup folder for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon. |
Boot or Logon Autostart Execution:Registry Run Keys | GrimAgent can set persistence with a Registry run key. |
Boot or Logon Autostart Execution:Registry Run Keys | GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce. |
Boot or Logon Autostart Execution:Registry Run Keys | Hancitor has added Registry Run keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Helminth establishes persistence by creating a shortcut in the Start Menu folder. |
Boot or Logon Autostart Execution:Registry Run Keys | Heyoka Backdoor can establish persistence with the auto start function including using the value EverNoteTrayUService. |
Boot or Logon Autostart Execution:Registry Run Keys | Hi-Zor creates a Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It added a spoofed binary to the start-up folder for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn "%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe" to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | IcedID has established persistence by creating a Registry run key. |
Boot or Logon Autostart Execution:Registry Run Keys | It has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\. |
Boot or Logon Autostart Execution:Registry Run Keys | Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe. |
Boot or Logon Autostart Execution:Registry Run Keys | InvisiMole can place a lnk file in the Startup Folder to achieve persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | JCry has created payloads in the Startup directory to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process. |
Boot or Logon Autostart Execution:Registry Run Keys | Kasidet creates a Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Kazuar adds a sub-key under several Registry run keys. |
Boot or Logon Autostart Execution:Registry Run Keys | Several It backdoors achieved persistence by adding a Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | It has placed scripts in the startup folder for persistence and modified the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | Koadic has added persistence to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | KOCTOPUS can set the AutoRun Registry key with a PowerShell command. |
Boot or Logon Autostart Execution:Registry Run Keys | A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | It has achieved persistence via writing a PowerShell script to the autorun registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. |
Boot or Logon Autostart Execution:Registry Run Keys | LiteDuke can create persistence by adding a shortcut in the CurrentVersion\Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche ’ in order to execute its payload during Windows startup. |
Boot or Logon Autostart Execution:Registry Run Keys | LookBack sets up a Registry Run key to establish a persistence mechanism. |
Boot or Logon Autostart Execution:Registry Run Keys | Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic. |
Boot or Logon Autostart Execution:Registry Run Keys | It has used malicious DLLs that setup persistence in the Registry Key HKCU\Software\Microsoft\Windows\Current Version\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | It used the startup folder for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It malware has used Registry Run keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started. |
Boot or Logon Autostart Execution:Registry Run Keys | Matryoshka can establish persistence by adding Registry Run keys. |
Boot or Logon Autostart Execution:Registry Run Keys | Maze has created a file named "startup_vrun.bat" in the Startup folder of a virtual machine to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | MCMD can use Registry Run Keys for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Metamorfo has configured persistence to the Registry ket HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Mivast creates the following Registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia. |
Boot or Logon Autostart Execution:Registry Run Keys | MoleNet can achieve persitence on the infected machine by setting the Registry run key. |
Boot or Logon Autostart Execution:Registry Run Keys | It saved malicious files within the AppData and Startup folders to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Mongall can establish persistence with the auto start function including using the value EverNoteTrayUService. |
Boot or Logon Autostart Execution:Registry Run Keys | Mosquito establishes persistence under the Registry key HKCU\Software\Run auto_update. |
Boot or Logon Autostart Execution:Registry Run Keys | It has added Registry Run key KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has modified a victim's Windows Run registry to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism. |
Boot or Logon Autostart Execution:Registry Run Keys | NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine. |
Boot or Logon Autostart Execution:Registry Run Keys | NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Nebulae can achieve persistence through a Registry Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | The "SCOUT" variant of NETEAGLE achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | NETWIRE creates a Registry start-up entry to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | njRAT has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in %STARTUP%. |
Boot or Logon Autostart Execution:Registry Run Keys | NOKKI has established persistence by writing the payload to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory. |
Boot or Logon Autostart Execution:Registry Run Keys | Octopus achieved persistence by placing a malicious executable in the startup directory and has added the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to the Registry. |
Boot or Logon Autostart Execution:Registry Run Keys | Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | During Operation Dream Job, It placed LNK files into the victims' startup folder for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | During Operation Sharpshooter, a first-stage downloader installed Rising Sun to %Startup%\mssync.exe on a compromised host. |
Boot or Logon Autostart Execution:Registry Run Keys | It has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | Pisloader establishes persistence via a Registry Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce. |
Boot or Logon Autostart Execution:Registry Run Keys | PlugX adds Run key entries in the Registry to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | PoetRAT has added a registry key in the hive for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk. |
Boot or Logon Autostart Execution:Registry Run Keys | PowerDuke achieves persistence by using various Registry Run keys. |
Boot or Logon Autostart Execution:Registry Run Keys | PowerShower sets up persistence with a Registry run key. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.